. Net c # Use S22.Imap. dll to receive mails and specify the unread mails in the folder to be received, and change the unread quasi-State,
String host = Conf. configInfo. POP_Host; int port = Conf. configInfo. POP_Port; string username = Conf. configInfo. mailName; string password = Conf. configInfo. mailPassword; using (S22.Imap. imapClient client = new S22.Imap
the information from S2. And then use the S2 ' s information to cut-off uncessary search branches.Key point:iff S1 and S2 is scramble strings with all other, there must is a point (swap point) one S1 and S2, to Inde X"I" to cut-off the string into the separate substrings (sub-tree). s1[0, I) s1[i, len-1]s2[0, I) s2[i, len-1]//When the left-sub tree and Right-sub tree of S1 not need to swap positionor s1[0, I) s1[i, len-1]s2[len-I, len-1] s2[0, len-i)//When then left-sub tree and Right-sub tree
smessage, ByVal stype)
Dim x
Dim K
Dim AA
Dim BB
Dim CC
Dim DD
Dim A
Dim b
Dim C
Dim D
Const S11 = 7
Const S12 = 12
Const S13 = 17
Const S14 = 22
Const S21 = 5
Const S22 = 9
Const S23 = 14
Const S24 = 20
Const S31 = 4
Const S32 = 11
Const S33 = 16
Const S34 = 23
Const S41 = 6
Const S42 = 10
Const S43 = 15
Const S44 = 21
x = Converttowordarray (smessage) ' Encrypt step 1: Array conversion
A = amp;h67452301
b = amp;hefcdab8
MD5 Encryption Algorithm 2007-08-30 19:06
Import java.lang.reflect.*;/*************************************************The MD5 class implements the RSA Data Security, Inc., which is submitted to the IETFThe MD5 message-digest algorithm in the RFC1321.*************************************************/public class MD5{The following s11-s44 are actually a 4*4 matrix, which is written to facilitate the modificationstatic final int S11 = 7;static final int S12 = 12;static final int S13 =
following is the program code
Source file: Md5.cs
MD5 Alogrithm
by Rufi 2004.6.20 http://rufi.yculblog.com/
Using System;
Using System.Collections;
Using System.IO;
public class MD5 {
Static state variables
private static UInt32 A;
private static UInt32 B;
private static UInt32 C;
private static UInt32 D;
Number of bits to rotate in tranforming
Private Const int S11 = 7;
Private Const int S12 = 12;
Private Const int S13 = 17;
Private Const int S14 = 22;
Private Const int S21 = 5;
Private Cons
Bean Of the MD5 Algorithm@ Author: Topcat TuppinLast Modified: 10, Mar, 2001**************************************** *********/Package beartool;Import java. lang. reflect .*;/*************************************** **********The md5 class implements RSA Data Security, Inc. is submitted to the IETFThe MD5 message-digest algorithm in RFC1321.**************************************** *********/
Public class MD5 {/* The following S11-S44 is actually a 4*4 matrix, which is implemented with # define i
) 1991-2, RSA Data Security, Inc. Created 1991. AllRights Reserved.
License to copy and use this software is granted provided that itIs identified as the "RSA Data Security, Inc. MD5 message-DigestAlgorithm "in all material mentioning or referencing this softwareOr this function.License is also granted to make and use derivative works providedThat such works are identified as "derived from the RSA DataSecurity, Inc. MD5 message-Digest algorithm "in all materialMentioning or referencing the deriv
/*
Author: crazyd Date: 2002-12-29
Note: This code is written in embedded assembly, and the most important part of MD5 is written in assembly.
It has a high computing speed, which is nearly twice faster than the C code,
You can call the md5init, md5update, and md5final functions in sequence.
The following standard code:
Standard Code:# Include "md5.h"Void main (){Md5_ctx context;Md5init ( context );Md5update ( context, "crazyd", strlen ("crazyd "));Md5final ( context );}
Special instructions:Co
of the algorithm are not paid much attention, and the output is always incorrect. debugging takes a long time.
[Code]// Source file: md5.cs// MD5 alogrithm// By rufi 2004.6.20 http://rufi.yculblog.com/Using system;Using system. collections;Using system. IO;
Public class MD5 {// Static state variablesPrivate Static uint32;Private Static uint32 B;Private Static uint32 C;Private Static uint32 D;
// Number of BITs to rotate in tranformingPrivate const int S11 = 7;Private const int S12 = 12;Private
the MD5 Algorithm@ Author: topcat tuppinLast modified: 10, MAR, 2001**************************************** *********/Package beartool;Import java. Lang. Reflect .*;/*************************************** **********The MD5 class implements RSA Data Security, Inc. is submitted to the IETFThe MD5 message-Digest algorithm in rfc1321.**************************************** *********/
Public class MD5 {/* The following S11-S44 is actually a 4*4 matrix, which is implemented with # define in the or
(262144)M_l2power (a) = CLng (524288)M_l2power (+) = CLng (1048576)M_l2power = CLng (2097152)M_l2power (+) = CLng (4194304)M_l2power (+) = CLng (8388608)M_l2power (+) = CLng (16777216)M_l2power (+) = CLng (33554432)M_l2power (num) = CLng (67108864)M_l2power (+) = CLng (134217728)M_l2power = CLng (268435456)M_l2power (+) = CLng (536870912)M_l2power (+) = CLng (1073741824)
Dim x Dim k Dim aa Dim bb Dim dd Dim a Dim b Dim c Dim d Const S11 = 7 nb sp; Const S12 = Const S1
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.